Question
Which data monitoring method do the steps below BEST describe?
Keep a user log to document everyone that handles each piece of sensitive data.
Monitor the system in real time.
answer
File monitoring
DNS monitoring
DGA monitoroing
URL monitoring
Keep a user log to document everyone that handles each piece of sensitive data.
Monitor the system in real time.
answer
File monitoring
DNS monitoring
DGA monitoroing
URL monitoring
Answers
GPT-5 mini
File monitoring.
Reason: keeping user logs of who accesses/handles sensitive data and monitoring those events in real time are classic file access/audit and file integrity monitoring activities.
Reason: keeping user logs of who accesses/handles sensitive data and monitoring those events in real time are classic file access/audit and file integrity monitoring activities.